Skip to content

docs: update 3.15.0 changelog#1016

Open
adela-bytebase wants to merge 3 commits intomainfrom
a-branch-109
Open

docs: update 3.15.0 changelog#1016
adela-bytebase wants to merge 3 commits intomainfrom
a-branch-109

Conversation

@adela-bytebase
Copy link
Contributor

No description provided.

Copilot AI review requested due to automatic review settings February 13, 2026 12:41
@vercel
Copy link

vercel bot commented Feb 13, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
bytebase-com Error Error Feb 13, 2026 0:57am

Request Review

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the Bytebase 3.15.0 release changelog to improve Terraform-related guidance links and clarify a PostgreSQL bug fix description.

Changes:

  • Add/adjust Terraform provider documentation links for service account/workload identity and policy-related breaking changes.
  • Refine PostgreSQL bug-fix wording to expand “CTE” to “Common Table Expressions (CTE)”.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

- `DataSourceQueryPolicy` is merged into `QueryDataPolicy` and deprecated (auto-migrated).
- DDL/DML execution control is now configured at the project role level using `bb.sql.ddl` and `bb.sql.dml` permissions. The previous `disallow_ddl` / `disallow_dml` environment policy is removed.
- For Terraform users, the settings update also affect Terraform, need to update bytebase_policy configuration. [Latest provider documentation](https://registry.terraform.io/providers/bytebase/bytebase/3.15.1/docs/resources/policy)
- DDL/DML execution control is now managed via `bb.sql.ddl` and `bb.sql.dml` project role permissions, which can be restricted to specific environments. The previous `disallow_ddl` / `disallow_dml` environment policy is removed.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

DDL and DML execution control spans Settings/Policy updates and Role/Permissions
A better approach would be a separate section for DDL and DML execution control update, may be the first item in this "Other Notable Changes"
should explain:

  1. Environment condition is added to bb.sql.ddl and bb.sql.dml role grant as a replacement for disallow_ddl and disallow_dml environment policy,
  2. Only 1 environment condition can be configured for each IAM Policy (i.e. role grant). If you have different policies for DDL and DML previous (e.g. disallow DDL but allow DML), the recommended practice is to create 2 different roles - 1 for bb.sql.ddl environment condition and 1 for bb.sql.dml environment condition.
  3. disallow_ddl and disallow_dml are automatically migrated to be reflected in the role grants in an OR operation manner - if for specific environment, either disallow_ddl or disallow_dml is set to OFF, this environment condition will be configured for the role with bb.sql.ddl or bb.sql.dml permission. This could lead to breaking changes to the DDL and DML control if your disallow_ddl and disallow_dml are different in the environment policies, please take note and after the upgrade, follow the recommended practice to configure your role grants.
  4. for Terraform users, update the environment policy and your role grants accordingly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants